Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
source IPv4 address
source TCP or UDP ports
All of the above

Answers

Answer 1

Answer: All of the above

Explanation: Extended Access Control Lists(ACL) is the system that works between the Source IP address and the destination IP address for the granting or denying the permission for the traffic flow. This has very certain functioning and allow the traffic on the basis of the protocols such as TCP(transmission control protocol),UDP(user datagram protocol) etc.

All the given option are correct because IPv4(internet protocol version 4), TCP pots and UDP ports are the protocol types for source and can be filtered through extended ACL. Thus the correct option is all of the above.


Related Questions

-What are the primary activities of the Business Intelligence system?

Answers

Answer:

 The primary activity of the business intelligence system are as follow:

Data acquisition:

 The data acquisition in the business intelligence system is the process of organizing all the source of the data. It is the process of cleaning, relating and cataloging all the source of the data.

Analysis the business intelligence:

It is the process of planning and creating the strategy of the business intelligence. It also involve the data mining and proper knowledge of the management of the business intelligence system.


Explain what is meant by "big data". Write three examples for Big Data.

Answers

Explanation:

Big Data :- It describes a large volume of data - both unstructured and structured that swamp a business on a day-to-day basis.Big data is very important for a company because it help to determine the root cause of the failures in real time,detects fraudulent,recalculate risks.

Big data in healthcare industry.

Big data in education industry.

Big data in media and entertainment industry.

Big data refers to the massive volumes of data that require advanced tools for processing and analysis. Examples include social media data, healthcare data, and e-commerce data. These large datasets offer new insights and create value in various fields.

Understanding Big Data :

Big data refers to the massive volume of information that exceeds the processing capacity of traditional data management tools. This concept not only highlights the vast quantity of data available but also emphasizes the advanced techniques required to analyze it. By leveraging large scale data sets, we can extract new insights, predict trends, and create new value in various fields.

Examples of Big Data :

Social Media Data: Platforms like Face book, Twi tter, and In stagram generate enormous amounts of data daily through user interactions, posts, likes, and shares.Healthcare Data: Medical records, patient history, and real-time health monitoring systems create vast datasets that can be used to improve patient care and predict health trends.E-commerce Data: Online retailers such as Amazon track user behavior, purchase history, and product reviews to personalize shopping experiences and improve inventory management.

When would one use an executive summary?

Answers

Answer:

Every time you present your results to a person in a managerial position or who does not have expertise in the technical details and processes you followed to get your results

Explanation:

When it comes to software projects documentation, you generally have to build a report that will be read by different people. These people come from different backgrounds and know the project to a different extent. For this reason, the project should contain sections that facilitate the understanding of the reader.

In general, the first section of a project report is an executive summary. The executive summary is a concise description of the project, starting from the problem context and description, including the results, conclusions, and recommendations.

It should be no more that one page long and it should be written in a general language so whoever reads it understands what is your project about.

Write a program in c++ that asks the user for a sequence of n​integers, where the user provides the number of elements n​ then each of the elements. After storing the n​ values in the array, ask the user for a value to search within those elements and return the index of the first instance (starting with 0 as the first element). Each integer should be stored in an array in the order they were read from the user. Follow the prompts and output format listed below. The user is expected to enter no more than 256 elements, the array should be able to hold no less and no more​ than 256.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// function that return the first occurrence of item

int fun(int a[],int item,int n)

{

   for(int y=0;y<n;y++)

{// find first occurance

   if(a[y]==item)

   // return index

   return y;

}

}

// main function

int main()

{

// variables

int n,item;

// array that holds 256 number only

int a[256];

cout<<"enter the value of n:";

//read the value of n

cin>>n;

// if n is greater than 256, it will again ask for input

while(n>256)

{

   cout<<"value of n should be less than 256:"<<endl;

   cout<<"enter value of n again:";

   cin>>n;

}

// read n numbers

cout<<"enter "<<n<<" numbers:";

for(int x=0;x<n;x++)

{

   cin>>a[x];

}

// read item to be searched

cout<<"enter the number to be searched:";

cin>>item;

// calling the function and print the index

cout<<"item found at index "<<fun(a,item,n)<<endl;

}

Explanation:

Declare a variable "n" and create an array of size 256.Then read the value of "n". If n is greater than 256 then it will again ask user to enter a number less than 256.Then it will read "n" numbers from user and store them into array.Then it will read item to be searched and call the function with parameter array, item and n. function will find the first occurrence of the item and return its index.

Output:

enter the value of n:280

value of n should be less than 256:

enter value of n again:7

enter 7 numbers:12 4 7 9 7 6 21

enter the number to be searched:7

item found at index 2

Which of the following is a color effect that can be used to emphasize text?: *
a. Edging
b. Shading
c. Highlighting
d. Choices B and C

Answers

Answer: (C) Highlighting

Explanation:

Highlighting is the process in which we can use the different effects of the color for highlight the background and also used for emphasize the text. Highlight is very useful in highlighting the important line, text and any kind of special word.

It is mostly used for draw attention towards the important sentence in the given whole page or paragraph by highlighting some important line or words.

On the other hand, all the other options are incorrect as they does not involve in the color effect for emphasize the text.

Therefore, (C) is correct option.

Do you know some website that can make a questionnaire? And I can use the link then put up on the social media so that everyone can do it.​

Answers

Answer:

You can use the following websites for more of a simple and smooth experience

SoGoSurvey.

Survey Monkey.

Typeform.

Google Forms.

Client Heartbeat.

Zoho Survey.

Survey Gizmo.

Survey Planet.

Hope this helped!

Explanation:

Answer:

brainly!

Explanation:

i think this is what you are talking about

Simplify the following Boolean expressions using algebraic manipulation.

a. F(a,b) = a’b’ + ab + ab'

b. F(r,s,t) = r’ + rt + rs’ + rs’t’

c. F(x,y) = (x + y)’(x’ + y’)’

d. F(a,b,c) = b'+ bc + ab + a'bc'

e. F(a,b,c,d) = ac + b'd + a'bc + b'cd'

Answers

Answer:

Simplification of the expressions:

a) a’b’ + ab + ab' = a +b'

b) r’ + rt + rs’ + rs’t’ = r' + s' + t

c) (x + y)’(x’ + y’)’ = False

d) b'+ bc + ab + a'bc' = True

e) ac + b'd + a'bc + b'cd' = c + b'd

Explanation:

The step by step solution for each expression will use the following laws of Boolean Algebra:

Idempotent Law:

aa=a

a+a=a

Associative Law

:

(ab)c=a(bc)

(a+b)+c=a+(b+c)

Commutative Law

:

ab=ba

a+b=b+a

Distributive Law

:

a(b+c)=ab+ac

a+(bc)=(a+b)(a+c)

Identity Law

:

a*0=0   a*1=a

a+1=1   a+0=a

Complement Law

:

aa'=0

a+a'=1

Involution Law

:

(a')'=a

DeMorgan's Law

:

(ab)'=a'+b'

(a+b)'=a'b'

Absorption  Law:

a+(ab)=a

a(a+b)=a

(ab)+(ab')=a

(a+b)(a+b')=a

a+(a'b)=a+b

a(a'+b)a*b

Step by step Solution:

a) F(a,b)  = a’b’ + ab + ab'

a(b+b')+a'b'  Commutative Law

a+a'b  Complement Law

F(a,b)=a+b' Absorption  Law

b) F(r,s,t) = r’ + rt + rs’ + rs’t’

(r'+rs')+rt+rs't' Absorption  Law

r'+s'+rt+rs't' Distributive Law

r'+s'+rt+s' Absorption  Law

r'+s'+rt Absorption  Law

F(r,s,t) = r'+s'+t Absorption  Law

c) F(x,y) = (x + y)’(x’ + y’)’

(x'y')(x''y'') DeMorgan's Law

(x'y')xy Involution Law

x'(y'x)y  Associative Law

x'(xy')y  Commutative Law

(x'x)(y'y)  Associative Law

(0)(0) Complement Law

F(x,y)=False

d) F(a,b,c) = b'+ bc + ab + a'bc'

b'+c+b(a+a'c')  Absorption  Law

b'+c+b(a+c')  Absorption  Law

b'+c+ba+bc'  Distributive Law

(b'+ba)+(c+bc')  Associative Law

b'+a+c+b  Absorption  Law

1+a+c  Complement Law

F(a,b,c)=True

e) F(a,b,c,d) = ac + b'd + a'bc + b'cd'

ac+a'bc+b'd+b'cd'  Commutative Law

c(a+a'b)+b'(d+cd')   Associative and Distributive Law

c(a+b)+b'(d+c)  Absorption  Law

ac+bc+b'd+b'c  Distributive Law

ac+(bc+b'c)+b'd  Associative and Commutative Law

ac+c(b+b')+b'd  Associative and Distributive Law

ac+c*1+b'd  Complement Law

c(a+1)+b'd  Distributive and Identity Law

F(a,b,c,d)=c+b'd

Answer:

Explanation:

a) De Morgan's law: i) a * b = '(a' + b)

                                 ii) a + b = '('a + 'b)

b) Associativity: (r * s') + (s * t) + ( t' * r)

c) Commutativity: i) x + y = y + x

                             ii) x * y = y * x

d) Distributivity: a * ( b + c) = (a * b) + (a + c)

Explain the ‘V-Model’ for software testing?

Answers

Answer: V-model for software testing is referred to as a type of Systems development life cycle  model under which a process tends to be executed in sequential manner i.e. V-shape. It is also referred as Verification & Validation model. This is mostly based on company of testing period for a development stage. The development of each and every step is associated with testing phase. Therefore next phase will start only, once the previous stage has been completed i.e. each development activity,has a testing activity corresponding.

Define an array of the length 6 with the elements of WORD type. Initialize the first and the last of them with the same value of your choice; leave the remaining four uninitialized.

Answers

Answer:

string words[6];

words[0]="humming";

words[1]=words[0];

Explanation:

The above statement declares an array of size 6 which can store elements of type string or word. Then I have initialized the first and second elements with the word humming and the rest of the places in the arrays are uninitialized.

You have to include the header file string so that this array could work otherwise it will not.

The more critical a component or service, the higher the level of availability required. True False

Answers

Answer: True

Explanation:

 Yes, the given statement true that the if the component and any type of the services are critical then, there is higher level of the availability require. The critical component and services basically require more steps of implementation and also people so that they can verify each step of component and services that are implemented.

The high availability is basically the ability of the component system that are operated continuously to get the desired product availability. It also increase the efficiency of the desired component and services.

Final answer:

True, critically important services require a higher level of availability. Industries with higher stakes like airlines and healthcare invest more in reliability and security to avoid significant disruptions and maintain operations, reflecting the balance between higher costs and the need for constant system availability.

Explanation:

The statement 'The more critical a component or service, the higher the level of availability required' is indeed true. In the context of business and Information Technology (IT), critical functions demand higher availability because any downtime can result in significant disruptions, financial loss, and damage to reputation.

For instance, industries like airlines and healthcare require a near-constant uptime due to the high stakes involved in their operations. An IT breakdown in these fields could have dire consequences, not just in terms of revenue but also in terms of human safety. Therefore, these sectors invest heavily to ensure reliability and security of their services. Conversely, in organizations where IT is less critical, there may be less willingness to invest in such high levels of preparedness. This trade-off is sometimes referred to as the balance between reliability and cost. The cost of achieving high availability is justified in critical systems, while for less critical systems, a lower level of redundancy and availability may be deemed acceptable due to the lower associated risks and costs.

Name three recent advances that are influencing OS design.

Answers

Answer:

The three recent advances are:

1. Cloud Technology

2. Asynchronous Transfer Mode

3. GUI technology

Explanation:

1. Cloud Technology:

Withe the advent of this technology it has become more convenient to store and access the programs and data over the internet.

The increase in the use of this technology has influenced the Operating system to be designed in a more distributed manner.

2. Asynchronous Transfer Mode:

This mode allows the data transfer by using the methodology of flow control for the transfer of start and stop data bits.

The increased use of ATM for the transfer of data bit stream between components to obtain greater through put  has also influenced the design of the Operating System.

3. Graphic User Interface (GUI technology):

With the help of indicators (visual) and graphical icons, this technology allows the interaction with electronic devices.

The progress in this technology and the interfaces it provided the users with has been through many changes thus influencing the operating system  

to improvise their design thus enabling the smooth User Interface experience.

Suppose Dave drops a watermelon off a high bridge and lets it fall until it hits the water. If we neglect air resistance, then the distance d in meters fallen by the watermelon after t seconds is d = 0.5 * g * t 2 , where the acceleration of gravity g = 9.8 meters/second2 . Write a program that asks the user to input the number of seconds that the watermelon falls and the height h of the bridge above the water. The program should then calculate the distance fallen for each second from t = 0 until the value of t input by the user. If the total distance fallen is greater than the height of the bridge, then the program should tell the user that the distance fallen is not valid.

Answers

Final answer:

To calculate the distance fallen by the watermelon, use the formula d = 0.5 * g * t^2. Ask the user for the number of seconds the watermelon falls and the height of the bridge. Use a loop to calculate the distance fallen for each second and check if the total distance is valid.

Explanation:

To calculate the distance fallen by the watermelon, we can use the formula d = 0.5 * g * t^2, where g is the acceleration due to gravity and t is the time in seconds. The user will be asked to input the number of seconds that the watermelon falls and the height h of the bridge above the water. We can then use a loop to calculate the distance fallen for each second from t = 0 until the value of t input by the user. If the total distance fallen is greater than the height of the bridge, the program should display a message indicating that the distance fallen is not valid. Here is an example code in Python:

import math
def calculate_distance_fallen():
   g = 9.8
   t = int(input('Enter the number of seconds that the watermelon falls: '))
   h = float(input('Enter the height of the bridge above the water (in meters): '))
   
   total_distance = 0
   
   for i in range(t+1):
       distance = 0.5 * g * math.pow(i, 2)
       total_distance += distance
       
       if total_distance > h:
           print('The distance fallen is not valid')
           break
       
       print(f'The distance fallen after {i} second(s) is {distance:.2f} meters')
       
   print(f'The total distance fallen after {t} second(s) is {total_distance:.2f} meters')
calculate_distance_fallen()

An object contains data and the instructions that manipulate the data (Points : 2) True
False

Answers

Answer:

True

Explanation:

An object is used as a central concept in OOP. It contains data (state it represents) and behaviors (the message) that has a meaning in your software application. Most programmers like using object-oriented programming languages because of these objects it carries. These objects make it easier to build solutions with complete functionalities effectively. It represents the properties which are the data state and a method which is what it can do. A customer’s object data or property, for instance, is every key detail of the customer while the method is what this object can do with the data.

The exception classes are in packages in the ________.

a.)Compiler b.)JVM c.)Java API d.)Ex class

Answers

Answer: Compiler

Explanation:

 The exception classes are basically occur during the compilation of the program in the system. The exception is the event which disrupt the flow of the instruction.

It basically provide a way to transfer the control in the one part of the program to another program. The exception class is also known as run-time exception that basically indicate the condition in the class application.

All the other options are not in the form of packages in the exception class. Therefore, compiler is the correct option.

Examination of Internet records in order to reveal the identity of an anonymous poster is defined as

Doxing
Filtering
Spamming
Hacking

Answers

Answer: Doxing

Explanation: Doxing which is also referred as doxxing is defined as the revealing or publishing of the private records or information to the public.It is considered as the illegal practice which is base on the the internet service.The publicizing of the private data or confidential information is punishable offence.

Other options are incorrect because filtering is the elimination of the not required content, spamming is the activity of sending undesired bulk messages and hacking is the attacking of the system using false means to corrupt and steal data.Thus the correct option is doxing.

Assume you are given a variable x below:

int x = 10;

Create a pointer and save the memory address the variable x to the pointer:

Answer:

4.) You are given a class below, create a accessor and mutator function for field age.

class Student

{

public:

string name;

private:

int age;

}

Answers

Answer:

int x=10;

int *p=&x;

4)

class Student

{

public:

string name;

private:

int age;

public:

int accessor()   //accessor

{

   return age;

}

void mutator(int value)   //mutator function.

{

   age=value;

   return;

}

}

Explanation:

The above written statement creates a pointer of name p.Then the address of variable x is stored in the pointer p and it is done by using the & referencing operator.By doing this the address of the variable x is stored in pointer p.

In the next question two public functions are created with the names accessor and mutator respectively.Accessor function are used to access private values in the class and the Mutators are used to set the prviate values.That is what the accessor and mutator function is doing in the class.

2.4: Star Pattern Write a program that displays the following pattern: * *** ***** ******* ***** *** * Output. Seven lines of output as follows: The first consists of 3 spaces followed by a star. The second line consists of 2 spaces followed by a 3 stars. The third consists of one space followed by 5 stars, and the fourth consists just of 7 stars. The fifth line is identical to third, th sixth to the second and the seventh to the first. CLASS NAMES. Your program class should be called StarPattern

Answers

Answer:

// here is code in java.

public class NAMES

{

// main method

public static void main(String[] args)

{

int n=4;

// print the upper half

for(int a=1;a<=n;a++)

{

for(int b=1;b<=n-a;b++)

{

// print the spaces

System.out.print(" ");

}

// print the * of upper half

for(int x=1;x<=a*2-1;x++)

{

// print the *

System.out.print("*");

}

// print newline

System.out.println();

}

// print the lower half

for(int y=n-1;y>0;y--)

{

for(int z=1;z<=n-y;z++)

{

// print the spaces

System.out.print(" ");

}

for(int m=1;m<=y*2-1;m++)

{

// print the *

System.out.print("*");

}

// print newline

System.out.println();

}

}

}

Explanation:

Declare a variable "n" and initialize it with 4. First print the spaces (" ") of the upper half with the help of nested for loop.Then print the "*" of the upper half with for loop. Similarly print the lower half in revers order. This will print the required shape.

Output:

  *

 ***

*****

*******

*****

 ***

  *

Since intergers can only be positive numbers, it is always best to declare all numbers as floating point numbers.

True or False.

Answers

Answer:

False.

Explanation:

Integers can be both negative number and positive numbers.There is no need to declare negative integers as floating point numbers since they can accept negative numbers.The minimum possible value of int is INT_MIN and this value is negative.

So hence we can say that the answer to this question is false.

What class of DSS focuses on simulation and optimization?

Answers

Answer:

Model-Driven DSS

Explanation:

Model-Driven DSS emphasizes direct exposure and manipulation of a model like optimization, statistical, simulation models and financial model.

Model-driven DSS uses data and variables obtained by policy-makers to help decision-makers to analyze a situation. However, they are generally not data-intensive, which is normally a very massive database which is not required for model-driven DSS.

What's the difference between a Boolean function and a Boolean expression?

Answers

Explanation:

A boolean function is a function in any programming language whose return type is boolean means a function that returns true or false.For ex:-

bool func(int a,int b)

{

     if(a>b)

return true;

else

return false;

}

An expression is a combination of one or more variables,constants,operators,function and which is computed and produces a value in case of boolean expression the value that is calculated is either true or false.

for ex:-     bool result= a>b  && a>c;

. What is tokenizing?

Answers

Answer:

 The term tokenizing is the process of splitting the data or some text into the minimal useful or meaningful units.

The tokenzing break the sequence of the string into various keywords, words and meaningful phrases. This process of breaking different elements is also known as token.

Token is the individual sentence and word in the tokenizing process and some of the characters are marked as discarded in this process such as punctuation.  

.Draw the following sine wave in the time domain, showing amplitude and phase:

s(t) = 3sin (2π2t + π)

Answers

Answer with Explanation:

Part 1)

The given sine wave is as

[tex]y=3sin(2\pi t+\pi)[/tex]

The graphical representation of the wave is shown in the attached figure:

Part 2)

For a general wave equation [tex]y(t)=Asin(\omega t+\phi )[/tex]

'A' is defined as amplitude of the wave

[tex](\omega t+\phi )[/tex] is defined as phase of the wave

Upon comparing with the given wave function we observe

1) Amplitude of the given wave is 3

2) Phase of the given wave [tex](2\pi t+\phi )[/tex]

-What is the purpose of a Business Intelligence system?

Answers

Answer: Business intelligence(BI) system is the tool that is used in the business field through companies and organization. The main cause of using BI system because it acts as the collection of the methods and technologies that help in the changing the raw and rough data to useful information which improves the functioning of the organization.

It provides better functioning by identification of the appropriate data,managing the information and making it efficient in a manner to make it presentable. These features make the organization to easily access the data and improves operations.

How long is a subnet mask? (Please select one of the four options)

24 bits

32 bytes

32 bits

16 bits

Answers

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

Host portNetwork port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

What frequency band or bands do 802.11g, 802.11a, 802.11n, and 802.11ac use?

Answers

Answer:

802.11g: [tex]2.4Ghz[/tex]

802.11a: [tex]5Ghz[/tex]

802.11n: [tex]2.4Ghz[/tex]  and  [tex]5Ghz[/tex]

802.11ac: [tex]5Ghz[/tex]

Explanation:

802 is a Wi-Fi standard established by the IEEE in which, according to the corresponding standard, a data transmission rate is related.

About some of those standars:

802.11a: works with connections up to 54Mbps, operates in the 5GHz band,

802.11b: Works with connections up to 11mbps, operates in the 2.4GHz band,

802.11g: works with connections up to 54mbps, operates in the 2.4GHz band,

802.11n: Works with connections up to 600mbps, operates in the 2.4GHz and 5GHz band,

802.11ac: works with connections up to 1300Mbps, operates in the 5GHz band,

In a LOS communication, consider d = 60km, the requirement is to make two antennas (transmitter and receiver) such that the height of one antenna should be four time of the other. Considering this, find the appropriate heights of these two antennas.

Answers

Answer:

for ratio 1:4

height for antenna 1 = 42.36

and height for antenna 2 =169.46

Explanation:

given data

distance d = 60km

height h1 = 4 h2

to find out

find the appropriate heights of these two antennas

solution

we know here that distance between 2 antennas  in LOS ( line of sight ) is express as

[tex]d = 3.57\sqrt{kh}[/tex]   ......................1

here d is distance and k is curvature of earth i.e 4/3  and h is height

we know height is 1:4 so total height is 5 part to get ratio

put value in equation 1

[tex]60 = 3.57\sqrt{\frac{4}{3} h}[/tex]  

solve it we get

h = 211.83

so for ration divide by 5

[tex]\frac{211.83}{5}[/tex]

= 42.36

so for ratio 1:4

so height for antenna 1 = 42.36

and height for antenna 2 = 4 × 42.36 = 169.46

Which of the following is supported by a primary key?

Changeable over time
May be null
Unique
Updateable

Answers

Answer:

Unique.

Explanation:

Unique is supported by a primary key because of primary key we can uniquely identify the tuple so the attribute which has been set as primary key must contain values that are unique and these values cannot be null.These values should not be changeable over time and updateable because there is a chance if these values are manipulated a copy of it may be present in that attribute.So the primary key won't be able to uniquely identify the tuple.

: How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others?

Answers

Answer:

Get much money

Explanation:

Beause the people need money

What is Kerberos?

a.A three-headed dog from the Egyptian mythology

b.A trusted third-party authentication protocol

c.A security model

d.A remote authentication dial in user server

Answers

Answer:

b.A trusted third-party authentication protocol .

Explanation:

Kerberos is an authentication service protocol between the trusted hosts present on an untrusted network for example internet. Kerberos is built in all of the major OS's(Operating Systems) such as Microsoft windows ,Apple OS X,Linux .

Microsoft windows 2000 incorporated Kerberos protocol the default authentication method.

Why are random-access files preferable to sequential-access files in performance- oriented situations?

Answers

Answer: Random-access files are those file types which have the capability of being accessed anytime directly without the requirement of any other support or file.The reading and writing of data can be done from anywhere and any point of time.

Sequential-access files are those files which can be accessed only in sequential manner for the writing and reading purpose.The sequence followed is from beginning to end of file.

Performance-oriented situation requires those files in working that can perform with the superior ability to carry out the job and can be assessed easily as per demand.Thus, these features are performed by random access file as compared with sequential-access files.So, random -access files are more preferred .

Other Questions
How many times has the electoral college gone against popular vote the square root of 125 is between what two numbers Given that the number 8881 is not a prime number, prove that it has a prime factor that is at most 89. A particle m is thrown vertically upward with an initial velocity v. Assuming a resisting medium proportional to the velocity, where the proportionality factor is c, calculate the velocity with which the particle will strike the ground upon its return if there is a uniform gravitational field. The Frito-Lay plant applies a product focus strategy, which is appropriate for what type of producer? A. low-volume, high-variety B. low-volume, low-variety C. high-volume, low-variety D. high-volume, high-variety Which invention spread in the 1990s that allowed people easier access tonews and information? Nancy Kirkwood runs a small job shop where garments are made. The job shop employs 8 workers. Each worker is paid $10 per hour. During the first week of March, each worker worked 45 hours. Together, they produced a batch of 132 garments. Of these garments, 52 were "seconds" (meaning that they were flawed). The seconds were sold for $90 each at a factory outlet store. The remaining 80 garments were sold to retail outlets at a price of $198 per garment. What was the labor productivity, in dollars per labor-hour, at this job shop during the first week of March? A proton, initially traveling in the +x-direction with a speed of 5.0510^5 m/s , enters a uniform electric field directed vertically upward. After traveling in this field for 3.9010^7 s , the protons velocity is directed 45 above the +x-axis. What is the strength of the electric field? Describe Newton's Law of Viscosity and the constitutive behavior of non-Newtonian fluid Select the person responsible for the following: dynamo How can encryption be used to ensure message integrity? In object-oriented development, why is it necessary to use drivers and stubs in testing? Which of the following is NOT true of Aaron Copland?a. Copland was a great avant-garde innovator, and was not interested in writing music "for the people.b. "He was a great promoter of American music.c. His style was eclectic, he sought inspiration from American music of all kinds.d. He studied theory/composition with Nadia Boulanger in Paris. Which side did each nation fight for in World War II? Great Britain fought for the . The Soviet Union fought for the . Italy fought for the . Germany fought for the . The United States fought for the . Find the cube root of 10 upto 5 signaficant figures by newton raphson method David is conducting an online search for information on the treatment of acid reflux. What indicates that the information on the site he is viewing is accurate and trustworthy? Bob, the president of Commerce & Trade, Inc., claims that certain actions by the federal government and the state of Delaware infringe on rights guaranteed by the Bill of Rights. All of these rights limit a. none of the choices. b. private citizens and corporations. c. the federal government. d. the states. 1. What does Mrs. Luella Bates Washington Jones' reaction to the boy snatching her purse revealabout her character? You want to have the equivalent of $700,000 (in terms of today's spending power) when you retire in 30 years. Assume a 3% rate of annual inflation. If you can earn 10% annually, how much do you have to invest per year in order to have your full amount of money needed at retirement?(A) 21230.00(B) 85,651.00(C) 7856.00(D) 10,329.00 PLEASE HELPWhat is the function of the cholesterol molecules in a cell membrane?A. They make it thickerB. They make it more porous C. They make it more fluidD. They make it less flexible